Sir, I want to do cissp but I am in the beginner level in cybersecurity so sir please make a video on how can I learn cybersecurity any resources, etc.
Thank you sir , Don’t get stopped for little number of comment, There are only little number of people learning from your video couse we are future kings , Keep going sir I wish one day I will touch the top for you❤
Why everyone talks about kali ? How about blackarch? ofcourse you can say tools are important not distros but doesn't blackarch have more tools? arch itself is better than debian and I think blackarch is better than kali I've also heard that kali is spying on its users!!! (is it true?)
i use black arch, arch and kali. Black arch is not for noobs, best learn Arch before committing yourself to black arch. The amount of video tutorial's kali has is no-brainer and people will flock to kali for its versatile nature. Yes your right about BA having more repo's that kali cos it's designed purpose is to penetrate (no joke intended) and makes life that much easier cos they are pre-installed. Best advice after several years of learning myself is to pick a favorite and stick with it cos like all distro's they have updates and new patches etc. If you wiki archlinux you'll get the ins on how to operate the system and there are plenty of tutorials throughout the web. Best advice, dont rely to much on youtube but it's a good start to learn a few basics. Best way to not get busted is to exploit on yourself. Use a second operating system and as always...use vmware or box Oh and as for kali spying on you best find that out yourself. Check the filesums when downloading kali and read instructions carefully, that way you'll know if kali has been tampered with or if kali has been downloaded from a clone. Another thing to bear in mind is that kali is legally recognized by the state as an established product, in ways it's similar to having any tool downloaded. Kali is not meant to be used heavily, this may be why your suspicion in monitoring may come into practice. Kali will see that the user is using "specific" tools to operate long time exploit's that no doubt comes up as amber alert. After all, Kali is simply a tool used for ethical practices and not heavily dependent on penetrating. Arch and Black arch on the other hand is another story...
@@summerbee80 remember if you think your Kali Linux image is malicious or broken you can simply run the chkrootkit command or rkhunter to scan for pre installed rootkits and Trojans
Why is there a version in the microsoft store that looks different than the one on the website and why when downloading hyper v do u get a phishing notification? My real question is how do i make sure what i download to my computer is what i want to download and not something that can get information?
Hi I want to know what it could cost me to hire an ethical hacker to figure out how and who is using my information without my knowledge and what is their purpose.
I have an ip address that i get it from wireshark and when i connect to the ip it's showing that it's protected by cloudflare i want to hack the data base what should I do help please This ip is for a apk app and i couldn't find the server from the app source So i installed blue stacks on my pc the i checked the app ip can i hack the database with sql map?
Hello sir i want to say thank you for your informative videos and i want to ask you one question i'm software engineering student and i want to get in the cyber field and become certified in it could you tell me where to begin and if you could give me any advice . thank you
@@t.i.s.r.oofficial7142 Did I asked you to reply me? Are you the owner of the channel? Do you know me? If you're a english teacher then go ahead and teach your students not me. Mind your business stop seeking at others ass.